SlideShare uma empresa Scribd logo
1 de 43
Prepared by: Ameer Sameer Hamood
University of Babylon
Information technology - information networks
Cognitive Radio Networks
Overview
Brief history & Introduction
Characteristics of Cognitive Radio
Cognitive Radio Networks Architecture
Security Issues
Attacks on Cognitive Networks
Cognitive Radio Network Applications
Popular Cognition Techniques
future research direction
Conclusions
Brief history
The term cognitive radio was coined by Mitola in an article he wrote
with Maguire in 1999
and refers to a smart radio that has the ability to sense the external
environment, learn from the history and make intelligent decisions to
adjust its transmission parameters according
to the current state of the environment.
Introduction
The radio spectrum is divided into licensed and unlicensed
frequencies.
The licensed spectrum is for the exclusive use of designated users. For
instance, it includes the UHF/VHF TV frequency bands.
The unlicensed spectrum can be freely accessed by any user, following
certain rules (e.g., not exceeding a defined limit for transmission
power). It includes, for instance, the ISM (Industrial, Scientific and
Medical) and U-NII (Unlicensed National Information Infrastructure)
frequency bands. ISM is shared by technologies such as IEEE 802.11
for wireless local area networks (WLANs), Bluetooth .
The key enabling technology of dynamic spectrum access is
cognitive radio (CR) has emerged as one of the keys that
can help addressing the inefficient usage of the radio
spectrum. It exploits unused licensed radio frequencies,
often designated as spectrum holes see (Figure 1). or white
spaces. CR aims to enable secondary users to autonomously
access spectrum holes in the entire spectrum to increase
performance, as long as they do not harmfully interfere
with primary users. Basically, at a given time and location.
Introduction
(Figure 1) spectrum holes.
Introduction
In order to share the spectrum with licensed users without disturbing
them, and meet the diverse quality of service requirement of
applications, each CR user in a CRN must:
* Determine the portion of spectrum that is available, which is known
as Spectrum sensing.
* Select the best available channel, which is called Spectrum decision.
* Coordinate access to this channel with other users, which is known
as Spectrum sharing.
* Vacate the channel when a licensed user is detected, which is
referred as Spectrum mobility.
See figure (1) Cognitive Cycle .
Introduction
figure (1) Cognitive Cycle
Introduction
Characteristics of Cognitive Radio
cognitive Radio have main characteristics :
1- Cognitive capability
2- Reconfigurable Capability
3- self-organized capability
We can summarize 1- Cognitive capability as follows:
Spectrum sensing
Location identification
Network/system discovery
Service discovery
2- Reconfigurable Capability :
Frequency agility
Dynamic frequency selection
Adaptive modulation/coding (AMC)
Transmit power control (TPC)
Dynamic system/network access
Characteristics of Cognitive Radio
3- self-organized capability
With more intelligence to communication terminal devices, CRs
should be able to self-organize their communication based on sensing
and reconfigurable functions . see figure (3.S) below
Characteristics of Cognitive Radio
Cognitive Radio Networks Architecture
The basic components of CRNs are the mobile station (MS),
base station/access point (BSs/APs) and backbone/core
networks. These three basic components compose three kinds
of network architectures in CRNs:
1- Network architectures
2- Links in CRN
3- IP Mobility Management in CRN
Here only explain network architectures in CRNs:
1- Network architectures
A- Infrastructure-Based
B- Ad-hoc Architecture
C- Mesh Architecture
Cognitive Radio Networks Architecture
1- Infrastructure-Based
In the Infrastructure architecture (Figure 1.1), a MS can only access
a BS/AP in the one-hop manner. MSs under the transmission range of
the same BS/AP shall communicate with each other through the
BS/AP. Communications between different cells are routed through
backbone/core networks. The BS/ AP may be able to run one or
multiple communication standards/protocols to fulfil different
demands from MSs. A cognitive radio terminal can also access various
kinds of communication systems through their BS/AP.
Cognitive Radio Networks Architecture
Cognitive Radio Networks Architecture
Figure 1.1 Infrastructure architecture of a CRN
2- Ad-hoc Architecture
There is no infrastructure support in ad-hoc architecture (Figure 2.1).
The network is set up on the fly. If a MS recognizes that there are
some other MSs nearby and they are connectable through certain
communication standards/protocols, they can set up a link and thus
form an ad-hoc network. Note that these links between nodes may be
set up by different communication technologies. In addition, two
cognitive radio terminals can either communicate with each other by
using existing communication protocols (e.g., WiFi, Bluetooth) or
dynamically using spectrum holes .
Cognitive Radio Networks Architecture
Cognitive Radio Networks Architecture
Figure 2.1 Ad-hoc architecture of a CRN
3- Mesh Architecture
This architecture is a combination of the infrastructure and ad-hoc
architectures plus enabling the wireless connections between the BSs/APs
(Figure 3.1).
This network architecture is similar to the Hybrid Wireless Mesh Networks.
the BSs/APs work as wireless routers and form wireless backbones.
MSs can either access the BSs/APs directly or use other MSs as multi-hop
relay nodes.
Some BSs/APs may connect to the wired backbone/core networks and
function as gateways.
. If the BSs/APs have cognitive radio capabilities, they may use spectrum
holes to communicate with each other
Cognitive Radio Networks Architecture
Cognitive Radio Networks Architecture
Figure 3.1 Mesh architecture of a CRN
2- Links in CRN
Cognitive Radio Networks Architecture
Cognitive Radio Networks Architecture
3- IP Mobility Management in CRN
Security Issues
The question is how to protect the licensed spectrum and
users and also how to avoid unlicensed users from causing
interference with existing licensed users or use of special
reserved frequencies like, e.g., for emergency services.
Other possible security risks are involuntary downloading
of malicious software, licensed user emulation
Attacks on Cognitive Networks
We define an attack on cognitive networks as any activity that results
in :
(a) unacceptable interference to the licensed primary users
Or
(b) missed opportunities for secondary users.
An attack is considered strong if it involves a minimal number of
adversaries performing minimal operations but causing maximum
damage/loss to the primary and or secondary users in the network.
See figure (A.1) explain Layer Attacks :
figure (A.1)
Attacks on Cognitive Networks
Cognitive Radio Network Applications
Cognitive Radio Networking and Opportunistic Spectrum Access can
be used in different applications:
1- Cognitive Mesh Networks
2- Public Safety Networks
3- Disaster Relief and Emergency Networks
4- Battlefield Military Networks
5- Leased Networks
1- Cognitive Mesh Networks
Multi-hop wireless mesh networks have recently gained significant
popularity as a cost-effective solution for last-mile Internet access.
Traditional wireless mesh network are challenged by the scarcity of
the wireless bandwidth needed to meet the high-speed requirements of
existing wireless applications.
by allowing the mesh nodes to dynamically explore any available
spectral opportunities. Such cognitive mesh networks are meant be
used to provide broadband access to rural, tribal, and other under-
resourced regions.
See figure (1.C) explain Cognitive Mesh Networks
Cognitive Radio Network Applications
figure (1.C) Cognitive Mesh Networks
Cognitive Radio Network Applications
2- Public Safety Networks
Public safety networks are used for communications among police
officers and fire and paramedic personnel. Such networks are also
challenged by the limited amount of allocated spectrum. Even with
the recent extensions of the allocated public safety spectrum bands,
the public safety personnel do not have the technology to dynamically
operate across the different spectrum segments. Recall that public
safety licensees have a wide variety of bands available (VHF-Low,
VHFHi,220MHz, UHF below 800, UHF-800, etc.). The cognitive radio
technology can offer public safety networks more bandwidth through
Opportunistic Spectrum Access. Furthermore, a public safety CRN
can provide a substantial communication improvement by allowing
the interpretability across different public safety services while
smartly adapting to the high peak-to-average nature of the traffic
carried out by such networks. See figure (2.P)
Cognitive Radio Network Applications
Cognitive Radio Network Applications
figure (2.P) Public Safety Networks
3- Disaster Relief and Emergency Networks
Natural disasters such as hurricanes, earthquakes, wild fires, or other
unpredictable phenomena usually cause the communications infrastructure to
collapse. For example, some base stations of cellular networks can fall, the
connectivity between sensor nodes and the sink node in static wireless sensor
networks can be lost, existing Wireless Local Area Networks (WLANs) can be
damaged, etc. This results in a set of partially or fully damaged coexistent
networks that were previously deployed and then became disconnected.
Meanwhile, there is an urgent need for a means of communications to help
the rescue teams to facilitate organized help, rehabilitation efforts, and to
locate the disaster survivors. CRNs can be used for such emergency networks.
provide a significant amount of bandwidth that can handle the expected huge
amount of voice, video, and other critical and time-sensitive traffic
See figure (3.D)
Cognitive Radio Network Applications
figure (3.D) Disaster Relief and Emergency Networks
Cognitive Radio Network Applications
4- Battlefield Military Networks
Unfortunately, the recent advances in wireless technologies made the
job of communication jamming and/or hacking much easier.
Consequently, achieving reliable and secure communications in
modern battlefields has become a more challenging task. Recall that a
battlefield communication network provides the only means of
communications between soldiers, armed vehicles, and other units in
the battlefield amongst themselves as well as with the headquarters.
This implies that such networks do not only require significant
amount of bandwidth, but also mandate secure and reliable
communications to carry vital information. The cognitive radio is the
key enabling technology for realizing such densely deployed networks
which use distributed Opportunistic Spectrum Access strategies to
fulfill the bandwidth and reliability needs . see figure (4.B)
Cognitive Radio Network Applications
Cognitive Radio Network Applications
figure (4.B) Battlefield Military Networks
5- Leased Networks
All of the aforementioned CRN applications have the secondary users
exploiting the resources of the primary networks without being
beneficial to the primary networks in any way. However, a primary
network can benefit from leasing a fraction of its licensed spectrum to
secondary operators adopting cognitive radio technology to
opportunistically access the spectrum. The entrance of the secondary
operator to the market of the incumbent primary network can
increase the revenue of the primary licensed operator. See figure(5.L)
Cognitive Radio Network Applications
Cognitive Radio Network Applications
figure(5.L) Leased Networks
Cognitive Radio Network Applications
Popular Cognition Techniques
A list of popular cognition techniques that can be used in CF for the
control of CRNs :
Bayesian signal processing
Dynamic programming
Learning machines with feedback
Game theory
Dynamic frequency management
Software defined radio
Cross-layer protocol design
future research direction
A. Seamless spectrum handovers
B. Proactive spectrum selection and interference avoidance
C. Interdependency between the propagation characteristics of radio
signals and the frequency band in usage
D. Alternatives to the common channel
E. Energy efficiency
F. Validation of CR protocols
Conclusions
1- The radio spectrum is statically allocated and divided between
licensed and unlicensed frequencies.
2- Cognitive Radio is a recent network paradigm that enables a more
flexible and efficient usage of the radio spectrum.
3- The status of a wireless channel can change due to several reasons in
CR, such as node mobility, operating frequency, neighbor interference,
transmission power and primary user appearance.
4-The architecture of CR networks can either be centralized or
distributed.
5- The capabilities of cognitive radios as nodes of CRN can be classified
according to their functionalities based on the definition of cognitive
radio.
Reference
1- Cognitive Radio Networks Book by:
Professor Kwang-Cheng Chen
National Taiwan University, Taiwan
Professor Ramjee Prasad
Aalborg University, Denmark
2- COGNITIVE NETWORKS Towards Self-Aware Networks
Edited by
Qusay H. Mahmoud
University of Guelph, Canada
3- Cognitive Radio Networks
Edited by
Yang Xiao • Fei Hu
4- Cognitive Radio Networks Implementation and Application issues
in India By Lokesh Chouhan , Under the supervision of Prof. Aditya
Trivedi , ABV – Indian Institute of information , Technology &
Management, Gwalior
5- cognitive Radio Network
from Theory to Practice , Springer
Khattab ,A ;Perkins ,D;Bayoumi,M 2013,ISBN:978-1-4614-4032-1
6- Cognitive Radio Networks
Adrian Popescu Dept. of Communications and Computer Systems
School of Computing Blekinge Institute of Technology 371 79 Karlskrona,
Sweden
Reference
7- Cognitive Radio: Technology Survey and Future Research
Directions By : José Marinho , CISUC, University of Coimbra
ISEC, Polytechnic Institute of Coimbra , Coimbra, Portugal
Edmundo Monteiro , CISUC, University of Coimbra ,Coimbra,
Portugal
Reference
Cognitive radio networks

Mais conteúdo relacionado

Mais procurados

Cellular network
Cellular networkCellular network
Cellular networkshreb
 
OFDMA - Orthogonal Frequency Division Multiple Access PPT by PREM KAMAL
OFDMA - Orthogonal Frequency Division Multiple Access PPT by PREM KAMALOFDMA - Orthogonal Frequency Division Multiple Access PPT by PREM KAMAL
OFDMA - Orthogonal Frequency Division Multiple Access PPT by PREM KAMALprem kamal
 
Multiple Access in wireless communication
Multiple Access in wireless communicationMultiple Access in wireless communication
Multiple Access in wireless communicationMaulik Togadiya
 
Concepts of & cell sectoring and micro cell
Concepts of & cell sectoring and micro cellConcepts of & cell sectoring and micro cell
Concepts of & cell sectoring and micro cellKundan Kumar
 
4.5 equalizers and its types
4.5   equalizers and its types4.5   equalizers and its types
4.5 equalizers and its typesJAIGANESH SEKAR
 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...Pallepati Vasavi
 
Cognitive radio wireless sensor networks applications, challenges and researc...
Cognitive radio wireless sensor networks applications, challenges and researc...Cognitive radio wireless sensor networks applications, challenges and researc...
Cognitive radio wireless sensor networks applications, challenges and researc...Ameer Sameer
 
Unit 1 introduction to software defined radios
Unit 1   introduction to software defined radiosUnit 1   introduction to software defined radios
Unit 1 introduction to software defined radiosJAIGANESH SEKAR
 
2.3 time division multiple access
2.3   time division multiple access2.3   time division multiple access
2.3 time division multiple accessJAIGANESH SEKAR
 
Unit 3 introduction to cognitive radios
Unit 3   introduction to cognitive radiosUnit 3   introduction to cognitive radios
Unit 3 introduction to cognitive radiosJAIGANESH SEKAR
 

Mais procurados (20)

FDMA-TDMA-CDMA
FDMA-TDMA-CDMAFDMA-TDMA-CDMA
FDMA-TDMA-CDMA
 
Propagation Model
Propagation ModelPropagation Model
Propagation Model
 
Cellular network
Cellular networkCellular network
Cellular network
 
OFDMA - Orthogonal Frequency Division Multiple Access PPT by PREM KAMAL
OFDMA - Orthogonal Frequency Division Multiple Access PPT by PREM KAMALOFDMA - Orthogonal Frequency Division Multiple Access PPT by PREM KAMAL
OFDMA - Orthogonal Frequency Division Multiple Access PPT by PREM KAMAL
 
Multiple Access Techniques
Multiple Access TechniquesMultiple Access Techniques
Multiple Access Techniques
 
Multiple Access in wireless communication
Multiple Access in wireless communicationMultiple Access in wireless communication
Multiple Access in wireless communication
 
Concepts of & cell sectoring and micro cell
Concepts of & cell sectoring and micro cellConcepts of & cell sectoring and micro cell
Concepts of & cell sectoring and micro cell
 
Fundamental of cellular system
Fundamental of cellular systemFundamental of cellular system
Fundamental of cellular system
 
4.5 equalizers and its types
4.5   equalizers and its types4.5   equalizers and its types
4.5 equalizers and its types
 
Outdoor propagatiom model
Outdoor propagatiom modelOutdoor propagatiom model
Outdoor propagatiom model
 
IS-95 Cdma
IS-95 CdmaIS-95 Cdma
IS-95 Cdma
 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
 
Cognitive radio wireless sensor networks applications, challenges and researc...
Cognitive radio wireless sensor networks applications, challenges and researc...Cognitive radio wireless sensor networks applications, challenges and researc...
Cognitive radio wireless sensor networks applications, challenges and researc...
 
Earth Station Subsystem
Earth Station SubsystemEarth Station Subsystem
Earth Station Subsystem
 
Wireless Local Loop
Wireless Local LoopWireless Local Loop
Wireless Local Loop
 
Multiple access techniques for wireless communications
Multiple access techniques for wireless communicationsMultiple access techniques for wireless communications
Multiple access techniques for wireless communications
 
Unit 1 introduction to software defined radios
Unit 1   introduction to software defined radiosUnit 1   introduction to software defined radios
Unit 1 introduction to software defined radios
 
2.3 time division multiple access
2.3   time division multiple access2.3   time division multiple access
2.3 time division multiple access
 
Earlang ejercicios
Earlang ejerciciosEarlang ejercicios
Earlang ejercicios
 
Unit 3 introduction to cognitive radios
Unit 3   introduction to cognitive radiosUnit 3   introduction to cognitive radios
Unit 3 introduction to cognitive radios
 

Semelhante a Cognitive radio networks

Cognitive radio networks
Cognitive radio networksCognitive radio networks
Cognitive radio networkssangitaholkar
 
A survey on security threats and detection2013
A survey on security threats and detection2013A survey on security threats and detection2013
A survey on security threats and detection2013Amina RIYAHI
 
Cognitive Radio
Cognitive Radio Cognitive Radio
Cognitive Radio RiyaSaini16
 
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...IOSR Journals
 
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKS
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKSTHE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKS
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKSijwmn
 
Project report a dhoc wireless network
Project report a dhoc wireless networkProject report a dhoc wireless network
Project report a dhoc wireless networkShiza Kokab
 
Generating Insights
Generating InsightsGenerating Insights
Generating Insightstelecomtodd
 
Module 3 wlan,bluetooth vlan
Module 3 wlan,bluetooth vlanModule 3 wlan,bluetooth vlan
Module 3 wlan,bluetooth vlanDeepak John
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
A Secure QOS Distributed Routing Protocol for Hybrid Wireless Networks
A Secure QOS Distributed Routing Protocol for Hybrid Wireless NetworksA Secure QOS Distributed Routing Protocol for Hybrid Wireless Networks
A Secure QOS Distributed Routing Protocol for Hybrid Wireless Networksiosrjce
 
A secure qos distributed routing protocol for hybrid wireless networks
A secure qos distributed routing protocol for hybrid wireless networksA secure qos distributed routing protocol for hybrid wireless networks
A secure qos distributed routing protocol for hybrid wireless networksAAKASH S
 
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)IRJET Journal
 
CDMA Based Secure Cellular Communication via Satellite Link
CDMA Based Secure Cellular Communication via Satellite LinkCDMA Based Secure Cellular Communication via Satellite Link
CDMA Based Secure Cellular Communication via Satellite LinkIRJET Journal
 

Semelhante a Cognitive radio networks (20)

Cognitive radio networks
Cognitive radio networksCognitive radio networks
Cognitive radio networks
 
A survey on security threats and detection2013
A survey on security threats and detection2013A survey on security threats and detection2013
A survey on security threats and detection2013
 
Cognitive Radio
Cognitive Radio Cognitive Radio
Cognitive Radio
 
Cs6003 ahsn-add-qb
Cs6003 ahsn-add-qbCs6003 ahsn-add-qb
Cs6003 ahsn-add-qb
 
Cognitive Radio Networks
Cognitive Radio NetworksCognitive Radio Networks
Cognitive Radio Networks
 
CR (1)
CR (1)CR (1)
CR (1)
 
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
 
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKS
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKSTHE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKS
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKS
 
Project report a dhoc wireless network
Project report a dhoc wireless networkProject report a dhoc wireless network
Project report a dhoc wireless network
 
Generating Insights
Generating InsightsGenerating Insights
Generating Insights
 
Module 3 wlan,bluetooth vlan
Module 3 wlan,bluetooth vlanModule 3 wlan,bluetooth vlan
Module 3 wlan,bluetooth vlan
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Chapter
ChapterChapter
Chapter
 
COGNITIVE RADIO
COGNITIVE RADIOCOGNITIVE RADIO
COGNITIVE RADIO
 
A Secure QOS Distributed Routing Protocol for Hybrid Wireless Networks
A Secure QOS Distributed Routing Protocol for Hybrid Wireless NetworksA Secure QOS Distributed Routing Protocol for Hybrid Wireless Networks
A Secure QOS Distributed Routing Protocol for Hybrid Wireless Networks
 
H017225058
H017225058H017225058
H017225058
 
A secure qos distributed routing protocol for hybrid wireless networks
A secure qos distributed routing protocol for hybrid wireless networksA secure qos distributed routing protocol for hybrid wireless networks
A secure qos distributed routing protocol for hybrid wireless networks
 
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
 
H010524049
H010524049H010524049
H010524049
 
CDMA Based Secure Cellular Communication via Satellite Link
CDMA Based Secure Cellular Communication via Satellite LinkCDMA Based Secure Cellular Communication via Satellite Link
CDMA Based Secure Cellular Communication via Satellite Link
 

Mais de Ameer Sameer

Web ontology language (owl)
Web ontology language (owl)Web ontology language (owl)
Web ontology language (owl)Ameer Sameer
 
Security of software defined networking (sdn) and cognitive radio network (crn)
Security of software defined networking (sdn) and  cognitive radio network (crn)Security of software defined networking (sdn) and  cognitive radio network (crn)
Security of software defined networking (sdn) and cognitive radio network (crn)Ameer Sameer
 
Common linux ubuntu commands overview
Common linux  ubuntu commands overviewCommon linux  ubuntu commands overview
Common linux ubuntu commands overviewAmeer Sameer
 
Software defined networking players
Software defined networking playersSoftware defined networking players
Software defined networking playersAmeer Sameer
 
Open network operating system (onos)
Open network operating system (onos)Open network operating system (onos)
Open network operating system (onos)Ameer Sameer
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)Ameer Sameer
 

Mais de Ameer Sameer (6)

Web ontology language (owl)
Web ontology language (owl)Web ontology language (owl)
Web ontology language (owl)
 
Security of software defined networking (sdn) and cognitive radio network (crn)
Security of software defined networking (sdn) and  cognitive radio network (crn)Security of software defined networking (sdn) and  cognitive radio network (crn)
Security of software defined networking (sdn) and cognitive radio network (crn)
 
Common linux ubuntu commands overview
Common linux  ubuntu commands overviewCommon linux  ubuntu commands overview
Common linux ubuntu commands overview
 
Software defined networking players
Software defined networking playersSoftware defined networking players
Software defined networking players
 
Open network operating system (onos)
Open network operating system (onos)Open network operating system (onos)
Open network operating system (onos)
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)
 

Último

Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 

Último (20)

Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 

Cognitive radio networks

  • 1. Prepared by: Ameer Sameer Hamood University of Babylon Information technology - information networks Cognitive Radio Networks
  • 2. Overview Brief history & Introduction Characteristics of Cognitive Radio Cognitive Radio Networks Architecture Security Issues Attacks on Cognitive Networks Cognitive Radio Network Applications Popular Cognition Techniques future research direction Conclusions
  • 3. Brief history The term cognitive radio was coined by Mitola in an article he wrote with Maguire in 1999 and refers to a smart radio that has the ability to sense the external environment, learn from the history and make intelligent decisions to adjust its transmission parameters according to the current state of the environment.
  • 4. Introduction The radio spectrum is divided into licensed and unlicensed frequencies. The licensed spectrum is for the exclusive use of designated users. For instance, it includes the UHF/VHF TV frequency bands. The unlicensed spectrum can be freely accessed by any user, following certain rules (e.g., not exceeding a defined limit for transmission power). It includes, for instance, the ISM (Industrial, Scientific and Medical) and U-NII (Unlicensed National Information Infrastructure) frequency bands. ISM is shared by technologies such as IEEE 802.11 for wireless local area networks (WLANs), Bluetooth .
  • 5. The key enabling technology of dynamic spectrum access is cognitive radio (CR) has emerged as one of the keys that can help addressing the inefficient usage of the radio spectrum. It exploits unused licensed radio frequencies, often designated as spectrum holes see (Figure 1). or white spaces. CR aims to enable secondary users to autonomously access spectrum holes in the entire spectrum to increase performance, as long as they do not harmfully interfere with primary users. Basically, at a given time and location. Introduction
  • 6. (Figure 1) spectrum holes. Introduction
  • 7. In order to share the spectrum with licensed users without disturbing them, and meet the diverse quality of service requirement of applications, each CR user in a CRN must: * Determine the portion of spectrum that is available, which is known as Spectrum sensing. * Select the best available channel, which is called Spectrum decision. * Coordinate access to this channel with other users, which is known as Spectrum sharing. * Vacate the channel when a licensed user is detected, which is referred as Spectrum mobility. See figure (1) Cognitive Cycle . Introduction
  • 8. figure (1) Cognitive Cycle Introduction
  • 9. Characteristics of Cognitive Radio cognitive Radio have main characteristics : 1- Cognitive capability 2- Reconfigurable Capability 3- self-organized capability We can summarize 1- Cognitive capability as follows: Spectrum sensing Location identification Network/system discovery Service discovery
  • 10. 2- Reconfigurable Capability : Frequency agility Dynamic frequency selection Adaptive modulation/coding (AMC) Transmit power control (TPC) Dynamic system/network access Characteristics of Cognitive Radio
  • 11. 3- self-organized capability With more intelligence to communication terminal devices, CRs should be able to self-organize their communication based on sensing and reconfigurable functions . see figure (3.S) below Characteristics of Cognitive Radio
  • 12. Cognitive Radio Networks Architecture The basic components of CRNs are the mobile station (MS), base station/access point (BSs/APs) and backbone/core networks. These three basic components compose three kinds of network architectures in CRNs: 1- Network architectures 2- Links in CRN 3- IP Mobility Management in CRN
  • 13. Here only explain network architectures in CRNs: 1- Network architectures A- Infrastructure-Based B- Ad-hoc Architecture C- Mesh Architecture Cognitive Radio Networks Architecture
  • 14. 1- Infrastructure-Based In the Infrastructure architecture (Figure 1.1), a MS can only access a BS/AP in the one-hop manner. MSs under the transmission range of the same BS/AP shall communicate with each other through the BS/AP. Communications between different cells are routed through backbone/core networks. The BS/ AP may be able to run one or multiple communication standards/protocols to fulfil different demands from MSs. A cognitive radio terminal can also access various kinds of communication systems through their BS/AP. Cognitive Radio Networks Architecture
  • 15. Cognitive Radio Networks Architecture Figure 1.1 Infrastructure architecture of a CRN
  • 16. 2- Ad-hoc Architecture There is no infrastructure support in ad-hoc architecture (Figure 2.1). The network is set up on the fly. If a MS recognizes that there are some other MSs nearby and they are connectable through certain communication standards/protocols, they can set up a link and thus form an ad-hoc network. Note that these links between nodes may be set up by different communication technologies. In addition, two cognitive radio terminals can either communicate with each other by using existing communication protocols (e.g., WiFi, Bluetooth) or dynamically using spectrum holes . Cognitive Radio Networks Architecture
  • 17. Cognitive Radio Networks Architecture Figure 2.1 Ad-hoc architecture of a CRN
  • 18. 3- Mesh Architecture This architecture is a combination of the infrastructure and ad-hoc architectures plus enabling the wireless connections between the BSs/APs (Figure 3.1). This network architecture is similar to the Hybrid Wireless Mesh Networks. the BSs/APs work as wireless routers and form wireless backbones. MSs can either access the BSs/APs directly or use other MSs as multi-hop relay nodes. Some BSs/APs may connect to the wired backbone/core networks and function as gateways. . If the BSs/APs have cognitive radio capabilities, they may use spectrum holes to communicate with each other Cognitive Radio Networks Architecture
  • 19. Cognitive Radio Networks Architecture Figure 3.1 Mesh architecture of a CRN
  • 20. 2- Links in CRN Cognitive Radio Networks Architecture
  • 21. Cognitive Radio Networks Architecture 3- IP Mobility Management in CRN
  • 22. Security Issues The question is how to protect the licensed spectrum and users and also how to avoid unlicensed users from causing interference with existing licensed users or use of special reserved frequencies like, e.g., for emergency services. Other possible security risks are involuntary downloading of malicious software, licensed user emulation
  • 23. Attacks on Cognitive Networks We define an attack on cognitive networks as any activity that results in : (a) unacceptable interference to the licensed primary users Or (b) missed opportunities for secondary users. An attack is considered strong if it involves a minimal number of adversaries performing minimal operations but causing maximum damage/loss to the primary and or secondary users in the network. See figure (A.1) explain Layer Attacks :
  • 24. figure (A.1) Attacks on Cognitive Networks
  • 25. Cognitive Radio Network Applications Cognitive Radio Networking and Opportunistic Spectrum Access can be used in different applications: 1- Cognitive Mesh Networks 2- Public Safety Networks 3- Disaster Relief and Emergency Networks 4- Battlefield Military Networks 5- Leased Networks
  • 26. 1- Cognitive Mesh Networks Multi-hop wireless mesh networks have recently gained significant popularity as a cost-effective solution for last-mile Internet access. Traditional wireless mesh network are challenged by the scarcity of the wireless bandwidth needed to meet the high-speed requirements of existing wireless applications. by allowing the mesh nodes to dynamically explore any available spectral opportunities. Such cognitive mesh networks are meant be used to provide broadband access to rural, tribal, and other under- resourced regions. See figure (1.C) explain Cognitive Mesh Networks Cognitive Radio Network Applications
  • 27. figure (1.C) Cognitive Mesh Networks Cognitive Radio Network Applications
  • 28. 2- Public Safety Networks Public safety networks are used for communications among police officers and fire and paramedic personnel. Such networks are also challenged by the limited amount of allocated spectrum. Even with the recent extensions of the allocated public safety spectrum bands, the public safety personnel do not have the technology to dynamically operate across the different spectrum segments. Recall that public safety licensees have a wide variety of bands available (VHF-Low, VHFHi,220MHz, UHF below 800, UHF-800, etc.). The cognitive radio technology can offer public safety networks more bandwidth through Opportunistic Spectrum Access. Furthermore, a public safety CRN can provide a substantial communication improvement by allowing the interpretability across different public safety services while smartly adapting to the high peak-to-average nature of the traffic carried out by such networks. See figure (2.P) Cognitive Radio Network Applications
  • 29. Cognitive Radio Network Applications figure (2.P) Public Safety Networks
  • 30. 3- Disaster Relief and Emergency Networks Natural disasters such as hurricanes, earthquakes, wild fires, or other unpredictable phenomena usually cause the communications infrastructure to collapse. For example, some base stations of cellular networks can fall, the connectivity between sensor nodes and the sink node in static wireless sensor networks can be lost, existing Wireless Local Area Networks (WLANs) can be damaged, etc. This results in a set of partially or fully damaged coexistent networks that were previously deployed and then became disconnected. Meanwhile, there is an urgent need for a means of communications to help the rescue teams to facilitate organized help, rehabilitation efforts, and to locate the disaster survivors. CRNs can be used for such emergency networks. provide a significant amount of bandwidth that can handle the expected huge amount of voice, video, and other critical and time-sensitive traffic See figure (3.D) Cognitive Radio Network Applications
  • 31. figure (3.D) Disaster Relief and Emergency Networks Cognitive Radio Network Applications
  • 32. 4- Battlefield Military Networks Unfortunately, the recent advances in wireless technologies made the job of communication jamming and/or hacking much easier. Consequently, achieving reliable and secure communications in modern battlefields has become a more challenging task. Recall that a battlefield communication network provides the only means of communications between soldiers, armed vehicles, and other units in the battlefield amongst themselves as well as with the headquarters. This implies that such networks do not only require significant amount of bandwidth, but also mandate secure and reliable communications to carry vital information. The cognitive radio is the key enabling technology for realizing such densely deployed networks which use distributed Opportunistic Spectrum Access strategies to fulfill the bandwidth and reliability needs . see figure (4.B) Cognitive Radio Network Applications
  • 33. Cognitive Radio Network Applications figure (4.B) Battlefield Military Networks
  • 34. 5- Leased Networks All of the aforementioned CRN applications have the secondary users exploiting the resources of the primary networks without being beneficial to the primary networks in any way. However, a primary network can benefit from leasing a fraction of its licensed spectrum to secondary operators adopting cognitive radio technology to opportunistically access the spectrum. The entrance of the secondary operator to the market of the incumbent primary network can increase the revenue of the primary licensed operator. See figure(5.L) Cognitive Radio Network Applications
  • 35. Cognitive Radio Network Applications figure(5.L) Leased Networks
  • 36. Cognitive Radio Network Applications
  • 37. Popular Cognition Techniques A list of popular cognition techniques that can be used in CF for the control of CRNs : Bayesian signal processing Dynamic programming Learning machines with feedback Game theory Dynamic frequency management Software defined radio Cross-layer protocol design
  • 38. future research direction A. Seamless spectrum handovers B. Proactive spectrum selection and interference avoidance C. Interdependency between the propagation characteristics of radio signals and the frequency band in usage D. Alternatives to the common channel E. Energy efficiency F. Validation of CR protocols
  • 39. Conclusions 1- The radio spectrum is statically allocated and divided between licensed and unlicensed frequencies. 2- Cognitive Radio is a recent network paradigm that enables a more flexible and efficient usage of the radio spectrum. 3- The status of a wireless channel can change due to several reasons in CR, such as node mobility, operating frequency, neighbor interference, transmission power and primary user appearance. 4-The architecture of CR networks can either be centralized or distributed. 5- The capabilities of cognitive radios as nodes of CRN can be classified according to their functionalities based on the definition of cognitive radio.
  • 40. Reference 1- Cognitive Radio Networks Book by: Professor Kwang-Cheng Chen National Taiwan University, Taiwan Professor Ramjee Prasad Aalborg University, Denmark 2- COGNITIVE NETWORKS Towards Self-Aware Networks Edited by Qusay H. Mahmoud University of Guelph, Canada 3- Cognitive Radio Networks Edited by Yang Xiao • Fei Hu
  • 41. 4- Cognitive Radio Networks Implementation and Application issues in India By Lokesh Chouhan , Under the supervision of Prof. Aditya Trivedi , ABV – Indian Institute of information , Technology & Management, Gwalior 5- cognitive Radio Network from Theory to Practice , Springer Khattab ,A ;Perkins ,D;Bayoumi,M 2013,ISBN:978-1-4614-4032-1 6- Cognitive Radio Networks Adrian Popescu Dept. of Communications and Computer Systems School of Computing Blekinge Institute of Technology 371 79 Karlskrona, Sweden Reference
  • 42. 7- Cognitive Radio: Technology Survey and Future Research Directions By : José Marinho , CISUC, University of Coimbra ISEC, Polytechnic Institute of Coimbra , Coimbra, Portugal Edmundo Monteiro , CISUC, University of Coimbra ,Coimbra, Portugal Reference

Notas do Editor

  1. usually the 2.4 GHz ISM band allocated in most countries for use by anyone, without a license. Another commonly-used unlicensed band is the 5 GHz UNII band.
  2. spectrum holes Spectrum hole (SH) is defined as a spectrum band that can be utilized by unlicensed users, which is a basic resource for cognitive radio (CR) systems. Most of existing contributions detect SHs by sensing whether a primary signal is present or absent and then try to access them so that the CR and primary users use the spectrum band either at different time slots or in different geographic regions
  3. When an IP mobile host moves to a Visited (or Foreign) Network, a new Care-of Address is assigned to it and notified to the Home Network. At this time, the Home Agent, a node which is in charge of managing the traffic of mobile nodes, creates a soft "binding" state  between the Home Address of the relevant mobile host and its current CoA. Each packet sent by Correspondent Nodes towards the Home Address (other end-systems are unaware of Mobile Host position or movements) is captured by the Home Agent, encapsulated with IP-in-IP technique and tunnelled to the Foreign Network (that is towards the CoA). Then, a suitable network node, the so called the Foreign Agent, is committed to intercept these packets, to de-capsulate them, and finally to send them to the Mobile Host (by means of its Layer 2/MAC address). Many considerations arise from this brief description. First of all it must be noticed that Mobile IP has been developed to provide the user with portability features, that is to allow the mobile host disconnecting from its Home Network and reconnecting to the Internet in any sub-network by adopting Mobile IP protocol, thus without loosing its identity profile. Seamless roaming in wireless environments is not the main goal of Mobile IP and handover procedures may considerably impact the performance of the perceived service. In fact, each handover implies a new CoA assignment and an end-to-end signalling procedure to notify the new position to the Home Agent. During the time interval elapsed from the new CoA assignment to the mobile node till the binding refresh in the Home Agent cache, some data losses may occur, since packets are still addressed to the old CoA. The enhanced Mobile IP version is Mobile IPv6 (not standardized yet) which is enriched by many new features, and a lot of problems of Mobile IPv4 are overcome. However, these new features do not solve the basic problem of Mobile IP when deployed over wireless cellular environments, especially when handover frequency increases (for example when cell dimension decreases or when mobile host mobility increases). The signalling burden, latency and losses implied by frequent end-to-end signalling lead to the conclusion that plain Mobile IPv4/6 are not suitable for this kind of environments.
  4. Note that, the dynamic nature of OSA makes the ability to track and jam a communication more difficult. Thus motivated, DARPA initiated the Wireless Network after Next (WNaN) program aiming at creating a flexible architecture for military communications The main goal of the WNaN program is to develop a low-cost handheld cognitive radio terminal that is capable of selecting its own frequencies and forming a dense network within a large battlefield area.
  5. The primary users treat the set of secondary users as a spectrum consumer. Each primary user sells an unused portion of its spectrum (e.g., time slots in TDMA based wireless system) to the market at price pi (i=1,2,…,N). In this market, the demand of secondary users depends on the prices of per-unit spectrum. Each primary user chooses its own strategy pi to induce the subscription of the secondary users.
  6. Cognitive Framework (CF) has been defined for the control of communication in a cognitive radio network . This is basically a software framework, which is used to map the high-level communication requirements to the underlying network, based on the particular cognitive process used for this.